Black Market

Black Market

Events

Oct 302019

Webinar | Cybercrime, Inc: Exposing the Business of the Dark Web

Rachel Chism Image

Rachel Chism

Oct 232018

Diving Deeper: Malware

| Head of Incident Response and Forensics

In 1971, Creeper, perhaps the earliest documented occurrence of malware, was created in an experiment designed to test how a program might move between computers. Fast forward to 2018, and the seeds planted in that experiment decades ago have grown into something far more dangerous – countless malware variants infecting personal and enterprise networks, raking […]

Kevin Dickinson

Head of Incident Response and Forensics

Kevin Dickinson is the Head of Armor's Incident Response and Forensics division and brings 10 years of experience in computer forensics and security to the organization. His team works closely together with Armor's Threat Resistance Unit (TRU) and Indications and Warnings (I&W) teams to stay abreast of the rapidly evolving threat landscape and provide resolution on a wide-range of security issues. Kevin demonstrates a strong understanding of attacker techniques and methodologies, providing a uniquely qualified perspective in identifying and investigating potential security incidents and minimizing threat actors. Kevin is a GIAC Certified Incident Handler (GCIH) and Offensive Security Certified Professional (OSCP).

Sep 112018

Diving Deeper: DDoS Attacks

| Head of the Threat Resistance Unit

Distributed Denial-of-Service (DDoS) attacks are not the most sophisticated attacks to launch, but they certainly can be costly. They cause outages, force businesses to take down their websites, and frustrate both e-commerce customers and businesses.   A favorite weapon of hacktivists, DDoS is an effective tool for anyone looking to disrupt an organization’s operations, whether they are disgruntled former employees […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Events

Aug 292018

Black Market LIVE! Denver

admin Image

admin

Events

Aug 282018

Black Market LIVE! Chicago

admin Image

admin

Events

Aug 222018

Black Market LIVE! New York

admin Image

admin

Events

Aug 212018

Black Market LIVE! Atlanta

admin Image

admin

Aug 162018

Cyber Black Market: What You Wouldn’t Think a Hacker Wants

| Senior Threat Intel Analyst

It is not difficult to understand the value of stolen bank accounts, credit cards, and social security numbers to cybercriminals. Each of those items are pieces of the average person’s financial life, and the fact that they can easily translate to profits in the hands of sellers on the cyber black market should come as […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Events

Aug 162018

Black Market LIVE! Dallas

admin Image

admin

Events

Jul 192018

Information Systems Security Administration Northern Virginia Meeting

admin Image

admin